
As the late Douglas Adams explained in his popular series about the history of long-distance travel, the two best-known English-language e-books for those venturing beyond our own solar system are the formal but unexciting Encyclopedia Galactica, and its more casually-written competitor The Hitchhiker’s Guide to the Galaxy (HHGttG).
Space travel can be a tricky business, and an encouraging guidebook can be a great comfort, especially for the budget-conscious traveler.
In Adams’s own words:
In many of the more relaxed civilizations on the Outer Eastern Rim of the Galaxy, the Hitchhiker’s Guide has already supplanted the great Encyclopedia Galactica as the standard repository of all knowledge and wisdom, for though it has many omissions and contains much that is apocryphal, or at least wildly inaccurate, it scores over the older, more pedestrian work in two important respects.
First, it is slightly cheaper; and second, it has the words DON’T PANIC inscribed in large friendly letters on its cover.
In an unfortunate contrast, advice in the cybersecurity industry doesn’t seem to work this way.
Academic papers in the cybersecurity field are often written in a formal but jargon-laden style, which makes them hard to appreciate (or even to follow at all) for outsiders.
Peer review tends to keep them scientifically or mathematically on track, but contemporary academic funding seems to depend on research papers talking themselves up.
Research reports therefore often include upbeat, low-science “executive summaries” that understandably make the funding bodies feel good about the money they have already handed over, and help to attract ongoing funding for the authors’ future work.
Unlike the Encyclopedia Galactica, these reports are deliberately pitched as super-exciting and un-pedestrian, and are frequently accepted as bulging with advice that is critical to our cybersecurity future and vital to implement at once, even by readers who almost certainly didn’t follow (or even bother to read) the content beyond the self-promotional material at the start.
In another contrast, less formal articles about cybersecurity often take exactly the opposite approach to the laconic and easy-going HHGttG.
To avoid outright accusations of unethical behavior, dramatic cybersecurity articles rarely come with the words PANIC inscribed on the cover in unfriendly letters, but if you’re a cybersecurity cynic, you can be excused for behaving as if they do.
This sort of PR cyber-drama comes in regular bursts, often timed for maximum coverage to co-incide with popular times and seasons, including Halloween, Black Friday, the December holiday season, the New Year (Western and Eastern flavors, both now widely celebrated world-wide) and more.
The Western-style New Year is a particularly busy time for cyber-drama, with myriad Threat Reports coming out (mostly more of what happened last year, if you don’t have time to read them), Cybersecurity Predictions (mostly more of what happened this year), and Do These N Things Right Now, One Being to Buy Our Brand New Product listicles (mostly N-1 things that you’d have been wise to do last year, and the year before, and so on, long before the Brand New Product existed).
The good news is that if you ignore the hyperbole, the sales schpiel, the high drama, and the conspicuous lack of the words DON’T PANIC in friendly letters․․․
․․․then a lot of the advice in these reports, predictions and warnings is well-worth following, and has been for years.
Examples of effective and protective human-centered cybersecurity behavior include:
The bad news, of course, is that despite the useful and actionable advice they may contain, a lot of these high-drama seasonal warnings imply, or at least invite their readers to infer, that these are seasonal precautions, and thus that you can let your guard down at other times.
Please don’t do that!
As Amos the Armadillo has already warned: Cybersecurity advice that’s worth following today is worth following in your ongoing digital life.
Don’t take the right precautions on Black Friday or Cyber Monday and then let your guard down on Tuesday!
If you’re a LinkedIn user and you’re not yet following @SolCyber, do so now to keep up with the delightfully useful Amos The Armadillo’s Almanac series. SolCyber’s lovable mascot Amos provides regular, amusing, and easy-to-digest explanations of cybersecurity jargon, from MiTMs and IDSes to DDoSes and RCEs.
Even if you know all the jargon yourself, Amos will help you explain it to colleagues, friends, and family in an unpretentious, unintimidating way.
Don’t get stuck behind an ever-expanding convoy of security tools that leave you at the whim of policies and procedures that are dictated by the tools, even though they don’t suit your IT team, your colleagues, or your customers!
Paul Ducklin is a respected expert with more than 30 years of experience as a programmer, reverser, researcher and educator in the cybersecurity industry. Duck, as he is known, is also a globally respected writer, presenter and podcaster with an unmatched knack for explaining even the most complex technical issues in plain English. Read, learn, enjoy!
Featured image of HHGttG badge via Flickr, licensed under CC BY 2.0.
(The badge was given away with the HHGttG computer game of 1984. For old-school text adventure aficionados, the original source code of the game can be found and studied on GitHub. It’s written in a Lisp-like language called ZIL, itself derived from an AI language called MDL from the 1970s.)

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.






